As opposed to representing a document as a "bag of words" in most information retrieval applications, we propose a model of representing a web page as sets of named entities of multiple types. Specifically, ...
详细信息
ISBN:
(纸本)9781605580852
As opposed to representing a document as a "bag of words" in most information retrieval applications, we propose a model of representing a web page as sets of named entities of multiple types. Specifically, four types of named entities are extracted, namely person, geographic location, organization, and time. Moreover, the relations among these entities are also extracted, weighted, classified and marked by labels. On top of this model, some interesting applications are demonstrated. In particular, we introduce a notion of person-activity, which contains four different elements: person, location, time and activity. With this notion and based on a reasonably large set of web pages, we are able to show how one person's activities can be attributed by time and location, which gives a good idea of the mobility of the person under question.
We analyze the security of the CV-QKD protocol with noisy coherent states,which is assumed to be induced a neutral party,*** the model, we prove the equivalence between the prepare and measurement (P&M) scheme a...
详细信息
We analyze the security of the CV-QKD protocol with noisy coherent states,which is assumed to be induced a neutral party,*** the model, we prove the equivalence between the prepare and measurement (P&M) scheme and the entanglement based(E-B) scheme,and analyze the security against the individual and collective attacks.
As multicast applications become more and more popular, implementing multicast in optical domain has attracted more and more attention due to its more efficient bandwidth usage. The MC-OXC is the key for realizing mul...
详细信息
Some enabling technologies based on injection locked lasers for millimetre waveband radio over fiber access networks are discussed, including optical millimeter wave generation, single-band modulation, wavelength reus...
详细信息
Some enabling technologies based on injection locked lasers for millimetre waveband radio over fiber access networks are discussed, including optical millimeter wave generation, single-band modulation, wavelength reuse, dynamic and frequency response enhancement, and architecture.
We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, ...
详细信息
We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, then analyzed illuminance chart which was the result of simulation in several distance between reflective film and optical film. It showed the best matching between illuminance and uniformity while in 25mm distance. Finally, we discussed some problems with thermal dispersion.
We integrate the advantages of optical packet switching (OPS) network and fibre channel (FC) technology, and put forward fibre channel transportation based on optical packet switching network (FC over OPS) as a soluti...
详细信息
We integrate the advantages of optical packet switching (OPS) network and fibre channel (FC) technology, and put forward fibre channel transportation based on optical packet switching network (FC over OPS) as a solution for next generation avionics systems internetworking. We focus our research work on the interrelation between data segments aggregation and network real-timing performance. By simulation, we analyze the impact that bandwidth, minimum efficiency threshold and timing contribute to the network real-timing. Furthermore, we complete hardware prototype design and simulation, compare the results between software and hardware simulation and analyze the performance of this algorithm.
To find near-duplicate documents, fingerprint-based para-digms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches and are considered the state-of-the-art....
详细信息
ISBN:
(纸本)9781595939913
To find near-duplicate documents, fingerprint-based para-digms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches and are considered the state-of-the-art. Nevertheless, we see two aspects of these approaches which may be improved. First, high score under these algorithms' similarity measurement implies high probability of similarity between documents, which is different from high similarity of the documents. But how similar two documents are is what we really need to know. Second, there has to be a tradeoff between hash-code length and hash-code multiplicity in fingerprint paradigms, which makes it hard to maintain a satisfactory recall level while improving precision. In this paper our contributions are two-folded. First, we propose a framework for implementing the longest common subsequence (LCS) as a similarity measurement in reason-able computing time, which leads to both high precision and recall. Second, we present an algorithm to get a trustable partition from the LCS to reduce the negative impact from templates used in web page design. A comprehensive exper-iment was conducted to evaluate our method in terms of its effectiveness, efficiency, and quality of result. More specifi-cally, the method has been successfully used to partition a set of 430 million web pages into 68 million subsets of simi-lar pages, which demonstrates its effectiveness. For quality, we compared our method with simhash and a Cosine-based method through a sampling process (Cosine is compared to LCS as an alternative similarity measurement). The result showed that our algorithm reached an overall precision of 0.95 while simhash was 0.71 and Cosine was 0.82. At the same time our method obtains 1.86 times as much recall as simhash and 1.56 times as much recall as Cosine. Compar-ison experiment was also done for documents in the same web sites. For that, our algorithm, simhash and Cosine find almost the same number of true-positives at
TD-SCDMA cell search is performed in three scenarios: downlink guide slot (DwPTs) position search, downlink synchronization code (SYNC_DL) position search and frame synchronization control. A fast method for every sce...
详细信息
TD-SCDMA cell search is performed in three scenarios: downlink guide slot (DwPTs) position search, downlink synchronization code (SYNC_DL) position search and frame synchronization control. A fast method for every scenarios of downlink cell search in TD-SCDMA is proposed. Based on characteristics of frame and slot structure in TD-SCDMA, power-matching stencil method is used to find the position of downlink guide slot (DwPTs) and definition stencil method is proposed to decide the position of downlink synchronization code (SYNC_DL). Moreover, the problem of channel estimation for TD-SCDMA mobile communicationsystem is investigated and a new fast method for detecting downlink guide channel is derived to control frame synchronization. This new method simplifies calculation complexity, realizes fast and high efficiency network test system and can be applied to TD-SCDMA network planning and optimization. The conclusion can be proved by simulations and field testing which are mentioned.
We present a two-stage TDM/WDM metro-access integrated network with all-optical VPN across different sub-PONs. This feeder-ring with access-trees based architecture is employed to provide VPN service covering a wider ...
详细信息
We present a two-stage TDM/WDM metro-access integrated network with all-optical VPN across different sub-PONs. This feeder-ring with access-trees based architecture is employed to provide VPN service covering a wider area.
We propose and experimentally demonstrate simultaneous transmission of point-to- point data signals and selective delivery of point-to-multipoint video services based on extinction ratio control of ASK data and subseq...
详细信息
暂无评论